2SSO Authentication

SSO Authentication

SSO Authentication

SAML2 SSO works a bit differently. The username and password are not entered in the WMS Cloud login page. The user instead clicks the “Login using SSO” button (which will be available after the SSO configuration has been setup by following SR process mentioned earlier). The page gets redirected to the Identity Provider’s login page where the user will login using their username linked to the IDP (this is stored in the “Alternate username” field in WMS Cloud). If the authentication succeeds, a token is returned back to the WMS Cloud and the user is logged in to the application.

Note: SAML2 SSO backends that have been validated against WMS Cloud are Oracle IDCS and Azure AD.

Technical Configuration for SSO

For SAML2 SSO setup, the customer and Oracle exchange certain technical information needed to configure both systems.

Customer Provides Oracle provides
  • SAML2.0 Metadata including signing certificate.
  • For some IDPs customer may also need to provide additional information (details below).
  • Application Service Provide ID
  • The public key for request signing
  • SAML assertion URL
  • Other IDP configuration

Customer provided information:

The customer configures their IDP for Cloud WMS authentication, generates the SAML2 Metadata file, and sends it to Oracle. IDPs that support SAML2 SSO will have a mechanism to generate this file, including Oracle IDCS and Azure AD.

SAML2.0 MetaData - Customer must provide IDP metadata for SAML2.0, it can be provided in a metadata.xml file or a URL allowing Oracle to download the IDP metadata from customer site.

The specific fields that are used by Oracle are explained below. In addition, for IDCS, the MyApp URL is also needed (details below) and has to be sent separately as its not part of the metadata file.

IDCS SSO Information

Item Description
Issuer ID Unique identifier of the IDP
MyApp URL

The binding that is used to send the response to the Identity provider.

NOTE: IDCS also has an SSO_URL which is different. The Metadata does not include the MyApp URL

Response signature certificate

(X509 Certificate) – PEM format

Will verify tokens signed by IDCS
Domain name

Used to link WMS username with the SSO username, using "Alternate username"

For example if the username is "jdoe"@somedomain.com, then domain name is somedomain.com.

NOTE: Customers need to provide ALL domains that they need for WMS. We don’t support generic consumer domains (for example: @yahoo.com @gmail.com)

Note: An app has to be created in IDCS using the ROPC grant type. This is required for WMS to authenticate using IDCS.

Azure AD SSO Authentication

Item Description
Issuer ID

Unique identifier of the IDP

Single Sign-On URL The binding that is used to send the response to the Identity provider.

Response signature certificate

(X509 Certificate) – PEM format

Will verify tokens signed by the IDP
Domain name

Used to link WMS username with the SSO username, using "Alternate username"

For example: if the username is jdoe @somedomain.com, then the domain name is somedomain.com.

NOTE: Customers need to provide ALL domains that they need for WMS. We don’t support generic consumer domains (for example: @yahoo.com @gmail.com)

Note: Example assertion with NameID:
<saml:Assertion xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ...>
...
<saml:Subject> 
<saml:NameID>username@domain</saml:NameID> ... 
</saml:Subject> 
... 
</saml:Assertion>